Filters








252 Hits in 3.5 sec

A Restoration Method for Geometric Distortions to Improve Scanned Books Identification
스캔 도서 식별 성능 향상을 위한 기하하적 왜곡 복원 방법

Doyoung Kim, Sang-Hoon Lee, Sagar Jadhav, Sanghoon Lee
2015 Journal of Broadcast Engineering  
This paper presents a restoration framework for correcting geometric distortions in distorted comics to improve the comic content identification.  ...  Fingerprinting techniques have been emerged to provide a fast and reliable identification method of identifying e-comic contents.  ...  Comic identification system diagram 그림 2. [4]의 핑거프린트의 마스크 하나를 원본, 왜곡, 복원 이미지에 적용한 예시 Fig. 2.  ... 
doi:10.5909/jbe.2015.20.3.379 fatcat:yje3lagcerat7ecgsu6txqspvm

A STUDY ON THE IMPORTANCE OF IMAGE PROCESSING AND ITS APLLICATIONS

Basavaprasad B .
2014 International Journal of Research in Engineering and Technology  
Lossless density is favored for archival reasons and frequently for medical image processing, technical drawings, clipart or comics.  ...  Biometric identifiers are the exceptional, assessable characteristics used Fingerprint Verification / Identification The Fingerprint Verification antagonism (FVC) is an intercontinental competition  ... 
doi:10.15623/ijret.2014.0315029 fatcat:4f3s5q6whbaj7knuylb3bjt6mm

3D face recognition: a survey

Song Zhou, Sheng Xiao
2018 Human-Centric Computing and Information Sciences  
In human identification scenarios, facial metrics are more naturally accessible than many other biometrics, such as iris, fingerprint, and palm print [2] .  ...  Introduction Face recognition has been a hot research area for its wide range of applications [1] .  ...  Domain research problems Compared with other popular biometric identification technologies such as fingerprint, iris and retina based recognition, face recognition can identify a person at greater distance  ... 
doi:10.1186/s13673-018-0157-2 fatcat:xwhabcqu6zgy7bezu5744hgvhq

Blood and Bones: The Influence of the Mass Media on Australian Primary School Children's Understandings of Genes and DNA

Jenny Donovan, Grady Venville
2012 Science & Education  
Declaration This thesis contains published work, and/or work prepared for publication, some of which has been co-authored.  ...  The student must attach to this declaration a statement for each publication that clarifies the contribution of the student to the work.  ...  Hodgins: I ran a standard 8 nuclear markers for Canis. Booth: What is that, some kind of a bug? Intern: Not a bug Agent Booth.  ... 
doi:10.1007/s11191-012-9491-3 fatcat:s3tlu5p6evhpjhsza2632jmnfe

스캔 만화도서 식별 및 특징 검색 시스템 스캔 만화도서 식별 및 특징 검색 시스템 (An Identification and Feature Search System for Scanned Comics) (Sang-Hoon Lee) (Nakyeon Choi) (Sanghoon Lee)

unpublished
In this paper, we represent a system of identification and feature search for scanned comics in consideration of their content characteristics.  ...  For creating the feature of the scanned comics, we utilize a method of hierarchical symmetry fingerprinting.  ...  그림 7 핑거프린트 매칭 모듈 Fig. 7 Fingerprint matching module 그림 6 스캔만화 식별 및 검색 시스템 Fig. 6 The system of identification and search for scanned comics 대푯값을 추출하기 위하여 스캔만화 한 권 내의 연속적 인 페이지 이미지들이 필요하다.  ... 
fatcat:gglbcc4sgjgevbqmjqhkfii2ba

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
Fingerprinting Contrary to the popular image of fingerprinting as a tool for forensic investigation, fingerprint identification was developed originally for purposes of administration and criminal recordkeeping  ...  The technique of fingerprinting is known as dactyloscopy. Until the advent of digital scanning technologies, fingerprinting was done using ink and a card.  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Magic Lantern Glass Slides Materials and Techniques: the First Multi-Analytical Study

Rodrigues, Santos, Melo, Otero, Vilarigues
2019 Heritage  
Infrared analysis detected a complex fingerprint in all colors, nevertheless, a terpenoid resin such as shellac was identified.  ...  The spectra were acquired using 10 s laser exposure time for 5 scans.  ...  low arsenic oxide content (< 0.2 wt%) and potassium oxide content of circa 0.2 wt%.  ... 
doi:10.3390/heritage2030154 fatcat:7jfi3jrnhneexi4fqgdzs4a4qu

Gaming and the 'Parergodic' Work of Seriality in Interactive Digital Environments

Shane Denson
2021 Eludamos - Journal for Computer Game Culture  
We scan crime scenes with digital gadgets and search databases on the Batcomputer.  ...  image, but to make comics generally a more palatable (if not quite respectable) medium for adults.  ... 
doi:10.7557/23.6352 fatcat:ixerclrnhrgjbcv7uh64p7v3e4

Aware: Controlling App Access to I/O Devices on Mobile Platforms [article]

Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags and Trent Jaeger
2016 arXiv   pre-print
However, adversaries can trick users into authorizing malicious apps that exploit weaknesses in current mobile platforms to misuse such on-board I/O devices to stealthily capture photos, videos, and screen content  ...  Aware shows that a combination of system defenses and user interface can significantly strengthen defenses for controlling the use of on-board I/O devices.  ...  Apps able to record the screen content are also available for remote screen sharing or tutorial editing.  ... 
arXiv:1604.02171v1 fatcat:fum77kjmd5hghbtn26kkpjdtzi

Urinary proteomics and metabolomics studies to monitor bladder health and urological diseases

Zhaohui Chen, Jayoung Kim
2016 BMC Urology  
The urine proteome is much less complex than the serum and tissues, but nevertheless can contain biomarkers for diagnosis and prognosis of diseases.  ...  Discussion: We here discuss the use of mass spectrometry-based proteomics and metabolomics for urine biomarker assays, specifically with respect to the underlying mechanisms that trigger the pathological  ...  Oliver Fiehn (UC Davis) for careful review and editing the manuscript.  ... 
doi:10.1186/s12894-016-0129-7 pmid:27000794 pmcid:PMC4802825 fatcat:pwgp3wywkjgtfkl5xwkvaswe4y

Organization of taking exams of university students in online format: problems and opportunities

Egor Borisov, Elena Petrenko, Elena Zatsarinnaya, Alexey Romanov, Vera Cherkina, Lyudmila Sotnikova, V. Breskich
2020 E3S Web of Conferences  
A review of current authentication options used fingerprint reading, media streaming, and subsequent identification to authenticate small groups of students.  ...  Some authors suggest using a number of on-site processes to develop exams that minimize fraud (for example, broad blocks of questions, improving authentication methods (for example, keystrokes and fingerprints  ... 
doi:10.1051/e3sconf/202021708005 fatcat:zrrrrgd3frcb5pw4nnogjqfdz4

Separating the Sony Sheep from the Grokster Goats: Reckoning the Future Business Plans of Copyright-Dependent Technology Entrepreneurs

Jane C. Ginsburg
2008 Social Science Research Network  
"fingerprints" against the fingerprints of content contained in a library of copyrighted works; hashes, which are short files created by a mathematical algorithm that can also be used as fingerprints.  ...  . sophistication of filters, to recognize, for example, when the uploaded content matched by the "identification technology" to a copyrighted work consists entirely of the copyrighted content, or instead  ... 
doi:10.2139/ssrn.1095335 fatcat:pzqzayjvb5bazly3sfekvs5i24

4. Detectives, Traces, and Repetition in The Exploits of Elaine [chapter]

2018 Film Serials and the American Cinema, 1910-1940  
Jameson finally gets out of bed and scans his bedroom and an adjoining room for the source of the sound.  ...  The comic sketch, however, also demonstrates particular functions of the vocaphone that are crucial for an understanding of the climactic ending of this installment.  ... 
doi:10.1515/9789048537808-005 fatcat:nwjtlw4w35hu3lgzuppkjyfb5q

Privacy-Protecting Techniques for Behavioral Data: A Survey [article]

Simon Hanisch, Patricia Arias-Cabarcos, Javier Parra-Arnau, Thorsten Strufe
2021 arXiv   pre-print
In both cases, it is important that the content of the speech is intelligible for the intended listeners.  ...  For speaker de-identification they do not describe their own speaker de-identification techniques but give a framework for quantifying the utility privacy loss.  ... 
arXiv:2109.04120v1 fatcat:zsv2bgrynveutlq2akx3vllhbq

Metabolomics: A Way Forward for Crop Improvement

Ali Razzaq, Bushra Sadia, Ali Raza, Muhammad Khalid Hameed, Fozia Saleem
2019 Metabolites  
This review provides insight into the state-of-the-art plant metabolomics tools for crop improvement.  ...  Metabolomics plays a significant role in exploring environment–gene interactions, mutant characterization, phenotyping, identification of biomarkers, and drug discovery.  ...  Our apology for not citing all the relevant work due to space limitations. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/metabo9120303 pmid:31847393 fatcat:6md7ljmpvjakjf7oa7mcdeauoa
« Previous Showing results 1 — 15 out of 252 results